The proceedings contain 10 papers. The topics discussed include: Maude-NPA: cryptographic protocol analysis modulo equational properties; an introduction to certificate translation; federated identity management; electronic voting in the Netherlands: from early adoption to early abolishment; logic in access control; the open-source fixed-point model checker for symbolic analysis of security protocols; verification of concurrent programs with chalice; certified static analysis by abstract interpretation; resource usage analysis and its application to resource certification; and analysis of security threats, requirements, technologies and standards in wireless sensor networks.
Foundations of Security Analysis and Design V, FOSAD 2007/2008/2009 Tutorial Lectures / A. Aldini; G. Barthe; R. Gorrieri. - STAMPA. - (2009), pp. 1-338. [10.1007/978-3-642-03829-7]
Foundations of Security Analysis and Design V, FOSAD 2007/2008/2009 Tutorial Lectures
GORRIERI, ROBERTO
2009
Abstract
The proceedings contain 10 papers. The topics discussed include: Maude-NPA: cryptographic protocol analysis modulo equational properties; an introduction to certificate translation; federated identity management; electronic voting in the Netherlands: from early adoption to early abolishment; logic in access control; the open-source fixed-point model checker for symbolic analysis of security protocols; verification of concurrent programs with chalice; certified static analysis by abstract interpretation; resource usage analysis and its application to resource certification; and analysis of security threats, requirements, technologies and standards in wireless sensor networks.I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.